Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
Tarrask malware uses scheduled tasks for defense evasion

Windows Task Scheduler is a service that allows users to perform automated tasks (scheduled tasks) on a chosen computer for legitimate administrative purposes (e.g., scheduled updates for browsers and other applications)... threat actors commonly make use of this service to maintain persistence within a Windows environment.

Tarrask malware generates several artifacts upon the creation of a scheduled task, whether using the Task Scheduler GUI or the schtasks command line utility. Profiling the use of either of these tools can aid investigators in tracking this persistence mechanism:

https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/
Git commits improvement with Husky

Modern native git hooks made easy:

https://typicode.github.io/husky
Vault 1.10 Release Highlights

Introducing both new and updated tutorials for Vault 1.10 release & usage tutorials:

https://learn.hashicorp.com/collections/vault/new-release
A blueprint for evading industry leading endpoint protection in 2022

In this post, I’d like to lay out a collection of techniques that together can be used to bypassed industry leading enterprise endpoint protection solutions. This is purely for educational purposes for (ethical) red teamers and alike, so I’ve decided not to publicly release the source code. The aim for this post is to be accessible to a wide audience in the security industry, but not to drill down to the nitty gritty details of every technique. Instead, I will refer to writeups of others that deep dive better than I can:

https://vanmieghem.io/blueprint-for-evading-edr-in-2022/
Make phishing great again. VSTO office files are the new macro nightmare?

Visual Studio Tools for Office (VSTO) has the capability to export an Add-In which is embedded inside an Office document file (such as a Word DOCX). If this document is delivered in the right way (to avoid some inbuilt mitigations) it provides rich capabilities for attackers to phish users and gain code execution on a remote machine through the installation of a word Add-In:

https://medium.com/@airlockdigital/make-phishing-great-again-vsto-office-files-are-the-new-macro-nightmare-e09fcadef010
Limited Linux user creation noscript

Few time ago I needed create few limited users in my Linux distos, with limits - user can run only several commands - curl, ping…
Ok, I created simple noscript for this task… in short - sharing for you:

https://github.com/m0zgen/create-limited-user

P.S. All commands you can add in to commands.txt, all functionality described in the README.md, enjoy)
Extracting Cobalt Strike from Windows Error Reporting

https://bmcder.com/blog/extracting-cobalt-strike-from-windows-error-reporting
lexical - an extensible text editor framework that does things differently

https://lexical.dev

GH - https://github.com/facebook/lexical